First published: Tue Jan 30 2024(Updated: )
Moderate: openssh security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssh | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-askpass | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-askpass-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-cavs | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-cavs-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-clients | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-clients-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-debugsource | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-keycat | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-keycat-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-ldap | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-ldap-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-server | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-server-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-askpass | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-askpass-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-cavs | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-cavs-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-clients | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-clients-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-debugsource | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-keycat | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-keycat-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-ldap | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-ldap-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-server | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-server-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-askpass | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-askpass-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-cavs | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-cavs-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-clients | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-clients-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-debugsource | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-keycat | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-keycat-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-ldap | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-ldap-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-server | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh-server-debuginfo | <8.0p1-19.el8_9.2 | 8.0p1-19.el8_9.2 |
redhat/openssh | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-askpass | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-askpass-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-cavs | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-cavs-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-clients | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-clients-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-debugsource | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-keycat | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-keycat-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-ldap | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-ldap-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-server | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
redhat/openssh-server-debuginfo | <8.0p1-19.el8_9.2.aa | 8.0p1-19.el8_9.2.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Red Hat Enterprise Linux for Power, little endian |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0606 is classified as Moderate.
You can fix RHSA-2024:0606 by updating to the fixed version 8.0p1-19.el8_9.2 of the OpenSSH package.
RHSA-2024:0606 affects various versions of Red Hat Enterprise Linux, including ARM 64, Power, and x86_64 architectures.
The updates in RHSA-2024:0606 include patches for the openssh, openssh-clients, openssh-server, and related packages.
RHSA-2024:0606 addresses a prefix truncation attack vulnerability in OpenSSH.